Like many of you out there, you might be a Chrome browser addict, with Chrome usually being adopted as your main browser of choice for its convenient integration with Google services, extensions, and syncing across devices. But what if you could have a browser similar to your current Chrome one, but with faster […]
The holiday season brings about much travelling for many, and with that a lot of airport or hotel hopping about. As a traveller, you may often find yourself ready to be connected to the nearest Wifi connection you can get your hands on for the sake of sending a message back home, or […]
There will be a short outage between 5 to 15 minutes on each server from UTC 3:00 a.m. 19 July to UTC 3:00 a.m. 21 July due to a minor security patch being applied to all the servers. We apologise for any inconvenience in advance.
To all our users, between December 2016 and April 2017, OpenVPN 2.4.0 was audited for security vulnerabilities and the primary findings were two remote denial-of-service vulnerabilities. These have been fixed in OpenVPN 2.4.2. We have updated our GUI to the latest OpenVPN 2.4.2 and would like to advise everyone who is using our […]
There has been a vulnerability dubbed “Port Fail” revealed by Perfect Privacy that allows an attacker to reveal a person’s true IP address where the VPN provider has port forwarding enabled. This affected some of the largest VPN providers in the world including Ovpn.to, nVPN, and Private Internet Access (PIA). We would like […]
VPN Implications A couple of alarming findings have emerged namely the Logjam DHE Flaw. News reports claims that up to 66 percent of the VPN servers can be vulnerable to eavesdropping by nation-states if they use a DHE key exchange with a key that is 1024-bit or smaller. This means using huge computational […]
Lenovo recently admitted that it was installing software called Superfish in customer’s laptops that were sold between September 2014 and January 2015 although we understand that ThinkPads were unaffected. Superfish sought to improve customer’s shopping experience by analyzing the images you see during your browsing sessions and scours more than 70,000 stores to […]
Most IT users are familiar with antiviruses and spyware. What is often overlooked is the security of their data which they transmit and store online trusting the default technologies or the security of the companies that provide these services. Transmission of Data Online Anytime we use a public wi-fi connection or connect to […]